Beruflich Dokumente
Kultur Dokumente
On
To discover cyber attack scenarios to web browsers and web servers and to explain how to
CO 2 mitigate such threats K2
To discover and explain mobile software bugs posing cyber security threats, explain and
CO 3 recreate exploits, and to explain mitigation techniques. K3
To articulate the urgent need for cyber security in critical computer systems, networks, and
CO 4 world wide web, and to explain various threat scenarios K4
To articulate the well known cyber attack incidents, explain the attack scenarios, and explain
CO 5 mitigation techniques. K5, K6
Confidentiality Policies: Confinement Principle ,Detour Unix user IDs process IDs and privileges
II , More on confinement techniques ,System call interposition ,Error 404 digital Hacking in India
part 2 chase , VM based isolation ,Confinement principle ,Software fault isolation , Rootkits 08
,Intrusion Detection Systems
Secure architecture principles isolation and leas: Access Control Concepts , Unix and windows
access control summary ,Other issues in access control ,Introduction to browser isolation .
III Web security landscape : Web security definitions goals and threat models , HTTP content 08
rendering .Browser isolation .Security interface , Cookies frames and frame busting, Major web
server threats ,Cross site request forgery ,Cross site scripting ,Defenses and protections against XSS
, Finding vulnerabilities ,Secure development.
IV Basic cryptography: Public key cryptography ,RSA public key crypto ,Digital signature Hash
functions ,Public key distribution ,Real world protocols ,Basic terminologies ,Email security 08
certificates ,Transport Layer security TLS ,IP security , DNS security.
Internet Infrastructure: Basic security problems , Routing security ,DNS revisited ,Summary of
V 08
weaknesses of internet security ,.Link layer connectivity and TCP IP connectivity , Packet filtering
firewall ,Intrusion detection.
\
Text books:
1. William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 4th edition, 2010.
2. Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison Wesley, 2011.
3. William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 4th edition, 2010.
4. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press,
2001.
PYTHON PROGRAMMING
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
Conditionals: Conditional statement in Python (if-else statement, its working and execution),
Nested-if statement and Elif statement in Python, Expression Evaluation & Float Representation.
II 08
Loops: Purpose and working of loops , While loop including its working, For Loop , Nested Loops ,
Break and Continue.
Function: Parts of A Function , Execution of A Function , Keyword and Default Arguments ,Scope
Rules.
Strings : Length of the string and perform Concatenation and Repeat operations in it. Indexing and
III
Slicing of Strings. 08
Python Data Structure : Tuples , Unpacking Sequences , Lists , Mutable Sequences , List
Comprehension , Sets , Dictionaries
Higher Order Functions: Treat functions as first class Objects , Lambda Expressions
Sieve of Eratosthenes: generate prime numbers with the help of an algorithm given by the Greek
Mathematician named Eratosthenes, whose algorithm is known as Sieve of Eratosthenes.
File I/O : File input and output operations in Python Programming
Exceptions and Assertions
IV Modules : Introduction , Importing Modules , 08
Abstract Data Types : Abstract data types and ADT interface in Python Programming.
Classes : Class definition and other operations in the classes , Special Methods ( such as _init_,
_str_, comparison methods and Arithmetic methods etc.) , Class Example , Inheritance , Inheritance
and OOP.
Text books:
1. Allen B. Downey, ``Think Python: How to Think Like a Computer Scientist‘‘, 2nd edition, Updated for Python 3,
Shroff/O‘Reilly Publishers, 2016 (http://greenteapress.com/wp/thinkpython/)
2. Guido van Rossum and Fred L. Drake Jr, ―An Introduction to Python – Revised and updated for Python 3.2, Network
Theory Ltd., 2011.
3.John V Guttag, ―Introduction to Computation and Programming Using Python‘‘, Revised and expanded Edition, MIT
Press , 2013
4.Robert Sedgewick, Kevin Wayne, Robert Dondero, ―Introduction to Programming in Python: An Inter-disciplinary
Approach, Pearson India Education Services Pvt. Ltd., 2016.
5.Timothy A. Budd, ―Exploring Python‖, Mc-Graw Hill Education (India) Private Ltd.,, 2015.
6.Kenneth A. Lambert, ―Fundamentals of Python: First Programs‖, CENGAGE Learning, 2012.
7.Charles Dierbach, ―Introduction to Computer Science using Python: A Computational ProblemSolving Focus, Wiley
India Edition, 2013.
8.Paul Gries, Jennifer Campbell and Jason Montojo, ―Practical Programming: An Introduction to Computer Science
using Python 3‖, Second edition, Pragmatic Programmers, LLC, 2013.
Mapped With : https://ict.iitk.ac.in/product/python-programming-a-practical-approach/